US20050125693A1 - Automatic detection of wireless network type - Google Patents
Automatic detection of wireless network type Download PDFInfo
- Publication number
- US20050125693A1 US20050125693A1 US10/729,209 US72920903A US2005125693A1 US 20050125693 A1 US20050125693 A1 US 20050125693A1 US 72920903 A US72920903 A US 72920903A US 2005125693 A1 US2005125693 A1 US 2005125693A1
- Authority
- US
- United States
- Prior art keywords
- network
- wireless network
- wireless
- detection
- wpa
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates generally to wireless network communication, and, more particularly, to a system and method facilitating automatic detection of a wireless network type.
- Computer device(s) performing network communications over wireless links are becoming increasingly popular.
- the client device e.g., computer system
- the client device is able to discern two pieces of information about that network, without connecting to it (e.g., from the wireless network beacon): (1) the service set identifier (SSID) of the network (e.g., essentially its name); and, (2) whether or not the network encrypts data.
- SSID service set identifier
- an encryption key is required.
- the encryption key can be manually entered by the user and/or sent in accordance with the 802.1x protocol.
- the client device can generally determine whether the network is of type unencrypted, encrypted or, with the addition of a Wi-Fi Protected Access (WPA) information element, encrypted using WPA-pre-shared key or encrypted using WPA. If it is unencrypted, then a user needs only to acknowledge that the network is insecure, and that they wish to use it in spite of that information. However, if it is encrypted and does not use WPA, then it either requires the user to enter a WEP key or it is an 802.1x-enabled network which distributes the WEP key automatically (requiring the client computer to enable 802.1x authentication to complete the connection).
- WPA Wi-Fi Protected Access
- the client computer Since the client computer cannot tell whether the non-WPA encrypted network requires the user to enter a WEP key or is an 802.1x-enabled network which does not support WPA, it typically requests input from the user. In the vast majority of cases, the user is in no position, from a technical knowledge perspective, to answer such a request.
- wireless network client(s) can automatically detect the “type” of a network without requiring input from the user.
- the “type” in this context refers to the method of authentication and encryption that the network requires (e.g., unencrypted networks requiring no authentication, encrypted networks requiring the user to enter a WEP key, encrypted networks supporting 802.1x authentication, Wi-Fi Protected Access (WPA) networks requiring the user to enter a WPA pre-shared key, 802.1x enabled network which do support WPA, and/or wireless provisioning services supporting networks).
- WPA Wi-Fi Protected Access
- the system employs a technique for efficiently and safely determining which of the network types the user is attempting to connect to, thereby allowing the operating system to present the user with an appropriate user interface.
- the system can provide a way to distinguish whether (1) a manually-entered WEP key or (2) 802.1x authentication is required by the wireless network.
- a wireless network detection system having a connection component and a detection component.
- the connection component facilitates connection of a client system to at least one of a plurality of wireless networks.
- the detection component identifies a type of an available wireless network.
- identification by the detection component can be based, at least in part, upon receipt of a specific information element from a wireless network beacon.
- the detection component iteratively probes the wireless network beacon in connection with identifying a type of the wireless network.
- the detection component can first attempt to connect to the wireless network as if it were a wireless provisioning services (WPS) supporting network. By waiting for certain kinds of failure(s) in the authentication sequence, the detection component can determine if the network requires the user to enter a WEP key.
- WPS wireless provisioning services
- the detection component can wait a longer period of time (e.g., up to thirty seconds) for a particular piece of the authentication sequence (e.g., Protected extensible authentication protocol—type length value (PEAP-TLV)) that identifies a WPS network.
- a particular piece of the authentication sequence e.g., Protected extensible authentication protocol—type length value (PEAP-TLV)
- PAP-TLV Protected extensible authentication protocol—type length value
- the user is not asked to determine the network type. This can lead, for example, to user(s) who are more successful in their use of wireless networks and further reduce user frustration with wireless network(s).
- FIG. 1 is a block diagram of a wireless network detection system in accordance with an aspect of the present invention.
- FIG. 2 is a block diagram of exemplary wireless network types in accordance with an aspect of the present invention.
- FIG. 3 is a flow chart of a method facilitating wireless network detection in accordance with an aspect of the present invention.
- FIG. 4 is a flow chart of a method facilitating wireless network detection in accordance with an aspect of the present invention.
- FIG. 5 is a flow chart further illustrating the method of FIG. 4 .
- FIG. 6 illustrates an example operating environment in which the present invention may function.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a server and the server can be a component.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. Also, these components can execute from various computer readable media having various data structures stored thereon.
- the components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
- Computer components can be stored, for example, on computer readable media including, but not limited to, an ASIC (application specific integrated circuit), CD (compact disc), DVD (digital video disk), ROM (read only memory), floppy disk, hard disk, EEPROM (electrically erasable programmable read only memory) and memory stick in accordance with the present invention.
- the system 100 can facilitate automatic detection of a type of wireless network by a client (e.g., without requiring input from a user).
- Type of wireless network refers generally to the kind of authentication and encryption that the network requires.
- wireless networks can be divided into six types:
- the IEEE 802.11 set of standards defines two network types: encrypted networks (e.g., WEP networks) and unencrypted networks. Owing to the well-known weaknesses of the WEP protocol, the wireless industry implemented support for the IEEE 802.1x standard as a mechanism for addressing the key deficiencies in the WEP protocol, those being user authentication, encryption key management and encryption key distribution. For WEP-encrypted networks, the user needs to provide an encryption key and for 802.1x enabled networks the key is provided automatically if the user has a valid credential (e.g., such as a digital certificate or username and password). For 802.11 networks which are encrypted, this presents a usability problem as it is currently not possible to determine a priori whether the user needs to enter the WEP key or whether the network supports 802.1x, in which case they do not have to enter it.
- WEP-encrypted networks the user needs to provide an encryption key and for 802.1x enabled networks the key is provided automatically if the user has a valid credential (e.g., such as a digital
- WPA Wi-Fi Protected Access
- WPA also addresses some of the usability issues of the original 802.11 standard by specifying an information element which WPA-capable access points include in their beacon frame. This information element describes inter alia whether the network requires the user to enter the encryption key called WPA pre-shared key mode (WPA-PSK) or whether the key is provided automatically by virtue of the user's credential, referred to as “WPA mode”.
- WPA-PSK WPA pre-shared key mode
- WPA mode WPA mode
- WEP is defined by the IEEE 802.11 standard and is intended to provide a level of data confidentiality that is equivalent to a wired network. Due to the nature of wireless LAN networks, implementing a security infrastructure that monitors physical access to the network can be difficult. Unlike a wired network where a physical connection is required, anyone within range of a wireless access point (AP) can conceivably send and receive frames as well as listen for other frames being sent. This makes eavesdropping and remote sniffing of wireless LAN frames very easy.
- AP wireless access point
- WEP provides data confidentiality services by encrypting the data sent between wireless nodes.
- WEP encryption for an 802.11 frame is indicated by setting a WEP flag in the MAC header of the 802.11 frame.
- WEP provides data integrity for random errors by including an integrity check value (ICV) in the encrypted portion of the wireless frame.
- IOV integrity check value
- WEP defines: TABLE 1 Key type Description Multicast/global key Encryption key that helps to protect multicast and broadcast traffic from a wireless AP to all of its connected wireless clients.
- Unicast session key Encryption key that helps to protect unicast traffic between a wireless client and a wireless AP and multicast and broadcast traffic sent by a wireless client to the wireless AP.
- WEP encryption employs the RC4 symmetric stream cipher with 40-bit and 104-bit encryption keys.
- WPA is a Wi-Fi standard designed to improved upon the security features of WEP. Unlike WEP, 802.1x authentication is required in WPA. With WPA, rekeying of both unicast and global encryption keys is required. For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for every frame, and the change is synchronized between the wireless client and the wireless access point (AP). For the global encryption key, WPA includes a facility for the wireless AP to advertise the changed key to the connected wireless clients.
- TKIP Temporal Key Integrity Protocol
- TKIP replaces WEP with an encryption algorithm that is stronger than the WEP algorithm.
- TKIP also provides for verification of the security configuration after the encryption keys are determined; synchronized changing of the unicast encryption key for each frame; and, determination of a unique starting unicast encryption key for each pre-shared key authentication.
- WPA further employs a method know as “Michael” that specifies an algorithm that calculates an 8-byte message integrity code (MIC).
- MIC 8-byte message integrity code
- the MIC is placed between the data portion of the IEEE 802.11 frame and the 4-byte integrity check value (ICV).
- ICV 4-byte integrity check value
- the MIC field is encrypted together with the frame data and the ICV.
- WPA is an interim standard that will be replaced with the IEEE's 802.11i standard upon its completion.
- WPS allows Wi-Fi network providers and/or enterprises to send provisioning and configuration information to a mobile client as it connects to the Internet or a corporate network, providing seamless and automatic provisioning and configuration of the client with uniform sign-up experience.
- the network recognizes the user, automatically sets up the session, and bills the user's account.
- a network can request substantially any type of information from the user, for example, a user name, a coupon code, and/or demographic information.
- FIG. 2 a diagram 200 exemplary wireless network types in accordance with an aspect of the present invention is illustrated.
- Wireless networks encompassed by the original 802.11 specification 210 include encrypted 214 and not encrypted 216 .
- the 802.1x specification further facilitated automatic distribution of the WEP encryption key 222 and 802.1x authentication 224 .
- the introduction of WPS further provides for 802.1x authentication 224 to be sub-divided into network(s) that support WPS 242 and network(s) that do not support WPS 244 .
- WPA wireless network supporting the 802.11 specification and further encompassing the WPA specification 230 .
- These network(s) are encrypted 234 and can be sub-divided into WPA 236 (e.g., 802.1x-enabled networks that support WPA) and WPA PSK 238 .
- WPA Wired Equivalent Privacy
- the WPA node 236 can be further sub-divided into network(s) that support WPS 252 and network(s) that do not support WPS 254 .
- the Wireless Network Detection System 100 The Wireless Network Detection System 100
- the wireless network detection system 100 includes a connection component 110 and a detection component 120 .
- the connection component 110 facilitates connection of a client system 130 to at least one of a plurality of type of wireless networks.
- the detection component 120 can iteratively probe an available wireless network beacon 140 in connection with identifying a type of the wireless network.
- the system 100 can employ a probing technique to determine the network type of a “new” network the first time the user tries to connect to it.
- the system 100 can employ an information element from the wireless network beacon 140 to facilitate determination of the network type.
- the client computer when a user comes within range of a wireless network, the client computer is able to discern two pieces of information about that network, without connecting to it (e.g., from the wireless network beacon): (1) the SSID of the network (e.g., essentially its name); and, (2) whether or not the network encrypts data. If the network employs encryption, an encryption key is required. The encryption key can be manually entered by the user and/or via the 801 . 1 x protocol. Thus, for each of the network types, the information the client computer requires from the user can be different.
- the computer can only determine whether the network is (a) unencrypted (type #1) or (b) encrypted (type #2 or #4) or, with the addition of the WPA information element, encrypted using WPA-PSK (type #3) or encrypted using WPA (type #5) If it is unencrypted (e.g., type #1), then the user can acknowledge that the network is insecure, and that they wish to use it in spite of that information. However, if it is encrypted and does not use WPA, then it is either of type #2 or #4.
- the wireless network detection system 100 efficiently and safely determines which of a plurality of network types the user is attempting to connect to, in order to present the user with appropriate user interface (UI). As noted previously, for each of the network types, the information the client computer needs from the user can be different. Thus, the system 100 can provide a way to distinguish whether (1) a manually-entered WEP key or (2) 802.1x authentication is required by the wireless network without significant user input.
- the system 100 employs an information element (IE) from the wireless network beacon 140 to facilitate determination of the network type.
- IE information element
- the general concept of an IE is part of the 802.11 standard.
- a specific IE for example, two bits, can be used to provide information to distinguish between the types of network (e.g., three).
- the wireless network beacon 140 provides the IE to the detection component 120 . Based, at least in part, upon the IE, the detection component 120 identifies the type of wireless network.
- the system 100 employs a probing technique to determine the encryption type of a network, for example, performed the first time the user tries to connect to it.
- the detection component 120 can first attempt to connect to the wireless network as if it were a WPS network.
- WPS networks are a subset of 802.1x networks (e.g., type #4 or type #5) and may or may not support WPA.
- the detection component 120 can determine if the network is of type #2 (e.g., manually entered WEP key).
- the probing can mitigate impact upon the user by recognizing a common type of network (e.g., manually entered WEP key).
- the detection component 120 can wait a longer period of time (e.g., up to thirty seconds) for a particular piece of the authentication sequence (e.g., Protected extensible authentication protocol—type length value (PEAP-TLV)) that identifies a WPS network. In the absence of this piece of the sequence, the detection component 120 can identify the wireless network as type #4 or type #5 to the connection component 110 . If the particular piece of the authentication sequence is detected by the detection component 120 , then the detection component 120 can identify the network as a WPS supporting network to the connection component 110 .
- a particular piece of the authentication sequence e.g., Protected extensible authentication protocol—type length value (PEAP-TLV)
- PAP-TLV Protected extensible authentication protocol—type length value
- the user is not asked to determine the network type. This can lead, for example, to user(s) who are more successful in their use of wireless networks and further reduce user frustration with wireless network(s).
- the wireless network detection system 100 , the connection component 110 , the detection component 120 , the client system 130 and/or the wireless network beacon 140 can be computer components as that term is defined herein.
- FIGS. 3-5 methodologies that may be implemented in accordance with the present invention are illustrated. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of blocks, it is to be understood and appreciated that the present invention is not limited by the order of the blocks, as some blocks may, in accordance with the present invention, occur in different orders and/or concurrently with other blocks from that shown and described herein. Moreover, not all illustrated blocks may be required to implement the methodologies in accordance with the present invention.
- program modules include routines, programs, objects, data structures, etc. that perform particular tasks or implement particular abstract data types.
- functionality of the program modules may be combined or distributed as desired in various embodiments.
- a method facilitating wireless network detection 300 in accordance with an aspect of the present invention is illustrated.
- connection to a wireless network as a WPS network is attempted.
- a threshold period of time e.g. 30 seconds
- a particular piece of authentication information that identifies a WPS network (e.g., PEAP—TLV sequence).
- a threshold period of time e.g. 30 seconds
- a method facilitating wireless network detection 400 in accordance with an aspect of the present invention is illustrated.
- the connection process is begun.
- a determination is made as to whether the wireless network is encrypted (e.g., based, at least in part, upon information received from the wireless network beacon). If the determination at 408 is NO, at 412 , the network is identified as not encrypted.
- a user can be prompted for confirmation to connect to an insecure network, and, no further processing occurs.
- the network is identified as an 802.1x network.
- connection to the wireless network can be continued using a default 802.1x authentication type, and, no further processing occurs.
- FIG. 6 and the following discussion are intended to provide a brief, general description of a suitable operating environment 610 in which various aspects of the present invention may be implemented. While the invention is described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices, those skilled in the art will recognize that the invention can also be implemented in combination with other program modules and/or as a combination of hardware and software. Generally, however, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular data types.
- the operating environment 610 is only one example of a suitable operating environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention.
- an exemplary environment 610 for implementing various aspects of the invention includes a computer 612 .
- the computer 612 includes a processing unit 614 , a system memory 616 , and a system bus 618 .
- the system bus 618 couples system components including, but not limited to, the system memory 616 to the processing unit 614 .
- the processing unit 614 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit 614 .
- the system bus 618 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, an 8 -bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
- ISA Industrial Standard Architecture
- MSA Micro-Channel Architecture
- EISA Extended ISA
- IDE Intelligent Drive Electronics
- VLB VESA Local Bus
- PCI Peripheral Component Interconnect
- USB Universal Serial Bus
- AGP Advanced Graphics Port
- PCMCIA Personal Computer Memory Card International Association bus
- SCSI Small Computer Systems Interface
- the system memory 616 includes volatile memory 620 and nonvolatile memory 622 .
- the basic input/output system (BIOS) containing the basic routines to transfer information between elements within the computer 612 , such as during start-up, is stored in nonvolatile memory 622 .
- nonvolatile memory 622 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.
- Volatile memory 620 includes random access memory (RAM), which acts as external cache memory.
- RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
- SRAM synchronous RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchlink DRAM
- DRRAM direct Rambus RAM
- Disk storage 624 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick.
- disk storage 624 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
- an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
- a removable or non-removable interface is typically used such as interface 626 .
- FIG. 6 describes software that acts as an intermediary between users and the basic computer resources described in suitable operating environment 610 .
- Such software includes an operating system 628 .
- Operating system 628 which can be stored on disk storage 624 , acts to control and allocate resources of the computer system 612 .
- System applications 630 take advantage of the management of resources by operating system 628 through program modules 632 and program data 634 stored either in system memory 616 or on disk storage 624 . It is to be appreciated that the present invention can be implemented with various operating systems or combinations of operating systems.
- Input devices 636 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 614 through the system bus 618 via interface port(s) 638 .
- Interface port(s) 638 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB).
- Output device(s) 640 use some of the same type of ports as input device(s) 636 .
- a USB port may be used to provide input to computer 612 , and to output information from computer 612 to an output device 640 .
- Output adapter 642 is provided to illustrate that there are some output devices 640 like monitors, speakers, and printers among other output devices 640 that require special adapters.
- the output adapters 642 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 640 and the system bus 618 . It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 644 .
- Computer 612 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 644 .
- the remote computer(s) 644 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 612 .
- only a memory storage device 646 is illustrated with remote computer(s) 644 .
- Remote computer(s) 644 is logically connected to computer 612 through a network interface 648 and then physically connected via communication connection 650 .
- Network interface 648 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN).
- LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like.
- WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
- ISDN Integrated Services Digital Networks
- DSL Digital Subscriber Lines
- Communication connection(s) 650 refers to the hardware/software employed to connect the network interface 648 to the bus 618 . While communication connection 650 is shown for illustrative clarity inside computer 612 , it can also be external to computer 612 .
- the hardware/software necessary for connection to the network interface 648 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
- Communication Control (AREA)
Abstract
Description
- The present invention relates generally to wireless network communication, and, more particularly, to a system and method facilitating automatic detection of a wireless network type.
- Computer device(s) performing network communications over wireless links are becoming increasingly popular. Conventionally, when a user comes within range of a wireless network, the client device (e.g., computer system) is able to discern two pieces of information about that network, without connecting to it (e.g., from the wireless network beacon): (1) the service set identifier (SSID) of the network (e.g., essentially its name); and, (2) whether or not the network encrypts data. If the network employs encryption, an encryption key is required. The encryption key can be manually entered by the user and/or sent in accordance with the 802.1x protocol.
- With the information that the client device can retrieve from the wireless network beacon, the client device can generally determine whether the network is of type unencrypted, encrypted or, with the addition of a Wi-Fi Protected Access (WPA) information element, encrypted using WPA-pre-shared key or encrypted using WPA. If it is unencrypted, then a user needs only to acknowledge that the network is insecure, and that they wish to use it in spite of that information. However, if it is encrypted and does not use WPA, then it either requires the user to enter a WEP key or it is an 802.1x-enabled network which distributes the WEP key automatically (requiring the client computer to enable 802.1x authentication to complete the connection).
- Since the client computer cannot tell whether the non-WPA encrypted network requires the user to enter a WEP key or is an 802.1x-enabled network which does not support WPA, it typically requests input from the user. In the vast majority of cases, the user is in no position, from a technical knowledge perspective, to answer such a request.
- The following presents a simplified summary of the invention in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is not intended to identify key/critical elements of the invention or to delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later.
- The present invention provides for a system and method facilitating automatic detection of a type of wireless network. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network without requiring input from the user. The “type” in this context, refers to the method of authentication and encryption that the network requires (e.g., unencrypted networks requiring no authentication, encrypted networks requiring the user to enter a WEP key, encrypted networks supporting 802.1x authentication, Wi-Fi Protected Access (WPA) networks requiring the user to enter a WPA pre-shared key, 802.1x enabled network which do support WPA, and/or wireless provisioning services supporting networks). Thus, the system employs a technique for efficiently and safely determining which of the network types the user is attempting to connect to, thereby allowing the operating system to present the user with an appropriate user interface. For example, the system can provide a way to distinguish whether (1) a manually-entered WEP key or (2) 802.1x authentication is required by the wireless network.
- In accordance with another aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identifies a type of an available wireless network.
- In one example, identification by the detection component can be based, at least in part, upon receipt of a specific information element from a wireless network beacon. In another example, the detection component iteratively probes the wireless network beacon in connection with identifying a type of the wireless network.
- For example, the detection component can first attempt to connect to the wireless network as if it were a wireless provisioning services (WPS) supporting network. By waiting for certain kinds of failure(s) in the authentication sequence, the detection component can determine if the network requires the user to enter a WEP key.
- If the failures are not observed, the detection component can wait a longer period of time (e.g., up to thirty seconds) for a particular piece of the authentication sequence (e.g., Protected extensible authentication protocol—type length value (PEAP-TLV)) that identifies a WPS network. In the absence of this piece of the sequence, the detection component can identify the wireless network as an 802.1x-enabled network to the connection component. If the particular piece of the authentication sequence is detected by the detection component, then the detection component can identify the network as a WPS supporting network to the connection component.
- Accordingly, the user is not asked to determine the network type. This can lead, for example, to user(s) who are more successful in their use of wireless networks and further reduce user frustration with wireless network(s).
- To the accomplishment of the foregoing and related ends, certain illustrative aspects of the invention are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the invention may be employed and the present invention is intended to include all such aspects and their equivalents. Other advantages and novel features of the invention may become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
-
FIG. 1 is a block diagram of a wireless network detection system in accordance with an aspect of the present invention. -
FIG. 2 is a block diagram of exemplary wireless network types in accordance with an aspect of the present invention. -
FIG. 3 is a flow chart of a method facilitating wireless network detection in accordance with an aspect of the present invention. -
FIG. 4 is a flow chart of a method facilitating wireless network detection in accordance with an aspect of the present invention. -
FIG. 5 is a flow chart further illustrating the method ofFIG. 4 . -
FIG. 6 illustrates an example operating environment in which the present invention may function. - The present invention is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It may be evident, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the present invention.
- As used in this application, the terms “component,” “handler,” “model,” “system,” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. Also, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal). Computer components can be stored, for example, on computer readable media including, but not limited to, an ASIC (application specific integrated circuit), CD (compact disc), DVD (digital video disk), ROM (read only memory), floppy disk, hard disk, EEPROM (electrically erasable programmable read only memory) and memory stick in accordance with the present invention.
- Referring to
FIG. 1 , a wirelessnetwork detection system 100 in accordance with an aspect of the present invention is illustrated. Thesystem 100 can facilitate automatic detection of a type of wireless network by a client (e.g., without requiring input from a user). “Type” of wireless network refers generally to the kind of authentication and encryption that the network requires. In one example, wireless networks can be divided into six types: -
- (1) Unencrypted (e.g., open) networks which generally require no authentication.
- (2) Wired equivalent privacy (WEP) encrypted networks where the user needs to enter a WEP key
- (3) Wi-Fi Protected Access (WPA) encrypted network where the user needs to enter a WPA pre-shared key (WPAPSK)
- (4) 802.1x-enabled networks that do not support WPA.
- (5) 802.1x-enabled networks that do support WPA
- (6) Wireless provisioning services (WPS) supporting-enabled networks that do or do not support WPA
- The IEEE 802.11 set of standards defines two network types: encrypted networks (e.g., WEP networks) and unencrypted networks. Owing to the well-known weaknesses of the WEP protocol, the wireless industry implemented support for the IEEE 802.1x standard as a mechanism for addressing the key deficiencies in the WEP protocol, those being user authentication, encryption key management and encryption key distribution. For WEP-encrypted networks, the user needs to provide an encryption key and for 802.1x enabled networks the key is provided automatically if the user has a valid credential (e.g., such as a digital certificate or username and password). For 802.11 networks which are encrypted, this presents a usability problem as it is currently not possible to determine a priori whether the user needs to enter the WEP key or whether the network supports 802.1x, in which case they do not have to enter it.
- To address the underlying weaknesses of the WEP algorithm, which has been shown to be cryptographically weak, a security enhancement to the 802.11 set of standards was introduced, called Wi-Fi Protected Access (WPA). WPA also addresses some of the usability issues of the original 802.11 standard by specifying an information element which WPA-capable access points include in their beacon frame. This information element describes inter alia whether the network requires the user to enter the encryption key called WPA pre-shared key mode (WPA-PSK) or whether the key is provided automatically by virtue of the user's credential, referred to as “WPA mode”.
- Wired Equivalent Privacy
- WEP is defined by the IEEE 802.11 standard and is intended to provide a level of data confidentiality that is equivalent to a wired network. Due to the nature of wireless LAN networks, implementing a security infrastructure that monitors physical access to the network can be difficult. Unlike a wired network where a physical connection is required, anyone within range of a wireless access point (AP) can conceivably send and receive frames as well as listen for other frames being sent. This makes eavesdropping and remote sniffing of wireless LAN frames very easy.
- WEP provides data confidentiality services by encrypting the data sent between wireless nodes. WEP encryption for an 802.11 frame is indicated by setting a WEP flag in the MAC header of the 802.11 frame. WEP provides data integrity for random errors by including an integrity check value (ICV) in the encrypted portion of the wireless frame.
- The following tables illustrates the two shared keys that WEP defines:
TABLE 1 Key type Description Multicast/global key Encryption key that helps to protect multicast and broadcast traffic from a wireless AP to all of its connected wireless clients. Unicast session key Encryption key that helps to protect unicast traffic between a wireless client and a wireless AP and multicast and broadcast traffic sent by a wireless client to the wireless AP.
WEP encryption employs the RC4 symmetric stream cipher with 40-bit and 104-bit encryption keys. - Wi-Fi Protected Access
- WPA is a Wi-Fi standard designed to improved upon the security features of WEP. Unlike WEP, 802.1x authentication is required in WPA. With WPA, rekeying of both unicast and global encryption keys is required. For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for every frame, and the change is synchronized between the wireless client and the wireless access point (AP). For the global encryption key, WPA includes a facility for the wireless AP to advertise the changed key to the connected wireless clients.
- TKIP replaces WEP with an encryption algorithm that is stronger than the WEP algorithm. TKIP also provides for verification of the security configuration after the encryption keys are determined; synchronized changing of the unicast encryption key for each frame; and, determination of a unique starting unicast encryption key for each pre-shared key authentication.
- WPA further employs a method know as “Michael” that specifies an algorithm that calculates an 8-byte message integrity code (MIC). The MIC is placed between the data portion of the IEEE 802.11 frame and the 4-byte integrity check value (ICV). The MIC field is encrypted together with the frame data and the ICV.
- WPA is an interim standard that will be replaced with the IEEE's 802.11i standard upon its completion.
- Wireless Provisioning Services (WPS) Supporting Networks
- WPS allows Wi-Fi network providers and/or enterprises to send provisioning and configuration information to a mobile client as it connects to the Internet or a corporate network, providing seamless and automatic provisioning and configuration of the client with uniform sign-up experience. As a user logs onto a wireless network, the network recognizes the user, automatically sets up the session, and bills the user's account.
- The security of a wireless session is improved because the automatic authentication and encryption provided by WPS minimizes the chances that a user's wireless session will be broken into by rogue access points or hackers. With WPS, a network can request substantially any type of information from the user, for example, a user name, a coupon code, and/or demographic information.
- Distinctions Between Exemplary Wireless Network Types
- Turning briefly to
FIG. 2 , a diagram 200 exemplary wireless network types in accordance with an aspect of the present invention is illustrated. - Wireless networks encompassed by the original 802.11
specification 210 include encrypted 214 and not encrypted 216. The 802.1x specification further facilitated automatic distribution of theWEP encryption key 222 and 802.1xauthentication 224. The introduction of WPS further provides for 802.1xauthentication 224 to be sub-divided into network(s) thatsupport WPS 242 and network(s) that do not supportWPS 244. - Alternatively, introduction of the WPA specification provided for wireless network supporting the 802.11 specification and further encompassing the
WPA specification 230. These network(s) are encrypted 234 and can be sub-divided into WPA 236 (e.g., 802.1x-enabled networks that support WPA) andWPA PSK 238. With the introduction of WPS, theWPA node 236 can be further sub-divided into network(s) thatsupport WPS 252 and network(s) that do not supportWPS 254. - The Wireless
Network Detection System 100 - Returning to
FIG. 1 , the wirelessnetwork detection system 100 includes aconnection component 110 and adetection component 120. Theconnection component 110 facilitates connection of aclient system 130 to at least one of a plurality of type of wireless networks. Thedetection component 120 can iteratively probe an availablewireless network beacon 140 in connection with identifying a type of the wireless network. For example, thesystem 100 can employ a probing technique to determine the network type of a “new” network the first time the user tries to connect to it. Additionally and/or alternatively, thesystem 100 can employ an information element from thewireless network beacon 140 to facilitate determination of the network type. - As discussed previously, conventionally, when a user comes within range of a wireless network, the client computer is able to discern two pieces of information about that network, without connecting to it (e.g., from the wireless network beacon): (1) the SSID of the network (e.g., essentially its name); and, (2) whether or not the network encrypts data. If the network employs encryption, an encryption key is required. The encryption key can be manually entered by the user and/or via the 801.1 x protocol. Thus, for each of the network types, the information the client computer requires from the user can be different.
- However, with the information that the computer can retrieve from the network beacon, the computer can only determine whether the network is (a) unencrypted (type #1) or (b) encrypted (type #2 or #4) or, with the addition of the WPA information element, encrypted using WPA-PSK (type #3) or encrypted using WPA (type #5) If it is unencrypted (e.g., type #1), then the user can acknowledge that the network is insecure, and that they wish to use it in spite of that information. However, if it is encrypted and does not use WPA, then it is either of type #2 or #4. If it is type #2, the user would need to enter a WEP key, and if it is type #4, the user not need to enter a WEP key, but the client computer needs to enable 802.1x authentication to complete the connection. Since the client computer cannot tell whether the network is #2 or #4, it essentially has to ask the user. In the vast majority of cases, the user is in no position (from a technical knowledge perspective) to answer such a question. The introduction of WPS network(s) has made the situation even more complicated (e.g., three different types of encrypted networks).
- The wireless
network detection system 100 efficiently and safely determines which of a plurality of network types the user is attempting to connect to, in order to present the user with appropriate user interface (UI). As noted previously, for each of the network types, the information the client computer needs from the user can be different. Thus, thesystem 100 can provide a way to distinguish whether (1) a manually-entered WEP key or (2) 802.1x authentication is required by the wireless network without significant user input. - In one example, the
system 100 employs an information element (IE) from thewireless network beacon 140 to facilitate determination of the network type. The general concept of an IE is part of the 802.11 standard. In accordance with an aspect of the present invention, a specific IE, for example, two bits, can be used to provide information to distinguish between the types of network (e.g., three). The following table illustrated the structure and layout of an exemplary IE:TABLE 2 Size Name Value (octets) Description Element ID 0xDD 1 Length 11 1 OUI 0x00:50: f2 3 OUI Type 5 1 WPS supported True/False 1 Indicates whether the network supports wireless provisioning services 802.1X required True/False 1 For WEP (not WPA) networks, indicates whether 802.1X is required - In this example, the
wireless network beacon 140 provides the IE to thedetection component 120. Based, at least in part, upon the IE, thedetection component 120 identifies the type of wireless network. - In another example, the
system 100 employs a probing technique to determine the encryption type of a network, for example, performed the first time the user tries to connect to it. For example, thedetection component 120 can first attempt to connect to the wireless network as if it were a WPS network. WPS networks are a subset of 802.1x networks (e.g., type #4 or type #5) and may or may not support WPA. By waiting for certain kinds of failure(s) in the authentication sequence, thedetection component 120 can determine if the network is of type #2 (e.g., manually entered WEP key). For example, the probing can mitigate impact upon the user by recognizing a common type of network (e.g., manually entered WEP key). - If the failures are not observed, the
detection component 120 can wait a longer period of time (e.g., up to thirty seconds) for a particular piece of the authentication sequence (e.g., Protected extensible authentication protocol—type length value (PEAP-TLV)) that identifies a WPS network. In the absence of this piece of the sequence, thedetection component 120 can identify the wireless network as type #4 ortype # 5 to theconnection component 110. If the particular piece of the authentication sequence is detected by thedetection component 120, then thedetection component 120 can identify the network as a WPS supporting network to theconnection component 110. - Accordingly, the user is not asked to determine the network type. This can lead, for example, to user(s) who are more successful in their use of wireless networks and further reduce user frustration with wireless network(s).
- It is to be appreciated that the wireless
network detection system 100, theconnection component 110, thedetection component 120, theclient system 130 and/or thewireless network beacon 140 can be computer components as that term is defined herein. - Turning briefly to
FIGS. 3-5 , methodologies that may be implemented in accordance with the present invention are illustrated. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of blocks, it is to be understood and appreciated that the present invention is not limited by the order of the blocks, as some blocks may, in accordance with the present invention, occur in different orders and/or concurrently with other blocks from that shown and described herein. Moreover, not all illustrated blocks may be required to implement the methodologies in accordance with the present invention. - The invention may be described in the general context of computer-executable instructions, such as program modules, executed by one or more components. Generally, program modules include routines, programs, objects, data structures, etc. that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments.
- Referring to
FIG. 3 , a method facilitatingwireless network detection 300 in accordance with an aspect of the present invention is illustrated. At 310, connection to a wireless network as a WPS network is attempted. At 320, a determination is made as to whether the attempt was successful. If the determination at 320 is NO, at 330, the wireless network is identified as required a WEP key, and, no further processing occurs. - If the determination at 320 is YES, at 340, up to a threshold period of time (e.g., 30 seconds) is waited for a receipt of a particular piece of authentication information that identifies a WPS network (e.g., PEAP—TLV sequence). At 350, a determination is made as to whether the particular piece of authentication information has been received. If the determination at 350 is NO, at 360, the network is identified as type #4 or
type # 5, and, no further processing occurs. If the determination at 350 is YES, at 370, the network is identified as WPS-supporting, and, no further processing occurs. - Next, referring to
FIGS. 4 and 5 , a method facilitatingwireless network detection 400 in accordance with an aspect of the present invention is illustrated. At 404, the connection process is begun. At 408, a determination is made as to whether the wireless network is encrypted (e.g., based, at least in part, upon information received from the wireless network beacon). If the determination at 408 is NO, at 412, the network is identified as not encrypted. At 416, a user can be prompted for confirmation to connect to an insecure network, and, no further processing occurs. - If the determination at 408 is YES, at 420, a determination is made as to whether the network is WPA (e.g., based, at least, in part, upon information received from the wireless network beacon). If the determination at 420 is YES, at 422, at determination is made as to whether the network is WPA PSK (e.g., based, at least in part, upon information received from the wireless network beacon). If the determination at 422 is YES, at 424, the network is identified as WPA PSK. At 428, a user can be prompted to enter a WPA pre-shared key, and, no further processing occurs. If the determination at 422 is NO, processing continues at 432.
- If the determination at 420 is NO, at 432, a determination is made as to whether the network supports 802.1x. For example, as discussed previously, the determination can be made by employing a probing technique and/or an information element received from the wireless network beacon. If the determination at 432 is NO, at 436, the network is identified as a manual WEP type. At 440, a user can be prompted to enter a WEP key, and, no further processing occurs.
- If the determination at 432 is YES, at 444, a determination is made as to whether the network supports WPS. Again, the determination can be made by employing a probing technique and/or an information element received from the wireless network beacon. If the determination at 444 is YES, at 448, the network is identified as WPS-supporting. At 452, WPS information can be loaded and the connection continued, and, no further processing occurs.
- If the determination at 444 is NO, at 456, the network is identified as an 802.1x network. At 460, connection to the wireless network can be continued using a default 802.1x authentication type, and, no further processing occurs.
- In order to provide additional context for various aspects of the present invention,
FIG. 6 and the following discussion are intended to provide a brief, general description of asuitable operating environment 610 in which various aspects of the present invention may be implemented. While the invention is described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices, those skilled in the art will recognize that the invention can also be implemented in combination with other program modules and/or as a combination of hardware and software. Generally, however, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular data types. The operatingenvironment 610 is only one example of a suitable operating environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Other well known computer systems, environments, and/or configurations that may be suitable for use with the invention include but are not limited to, personal computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include the above systems or devices, and the like. - With reference to
FIG. 6 , anexemplary environment 610 for implementing various aspects of the invention includes acomputer 612. Thecomputer 612 includes aprocessing unit 614, asystem memory 616, and asystem bus 618. Thesystem bus 618 couples system components including, but not limited to, thesystem memory 616 to theprocessing unit 614. Theprocessing unit 614 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as theprocessing unit 614. - The
system bus 618 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, an 8-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI). - The
system memory 616 includesvolatile memory 620 andnonvolatile memory 622. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within thecomputer 612, such as during start-up, is stored innonvolatile memory 622. By way of illustration, and not limitation,nonvolatile memory 622 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.Volatile memory 620 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). -
Computer 612 also includes removable/nonremovable, volatile/nonvolatile computer storage media.FIG. 6 illustrates, for example adisk storage 624.Disk storage 624 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick. In addition,disk storage 624 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM). To facilitate connection of thedisk storage devices 624 to thesystem bus 618, a removable or non-removable interface is typically used such asinterface 626. - It is to be appreciated that
FIG. 6 describes software that acts as an intermediary between users and the basic computer resources described insuitable operating environment 610. Such software includes anoperating system 628.Operating system 628, which can be stored ondisk storage 624, acts to control and allocate resources of thecomputer system 612.System applications 630 take advantage of the management of resources byoperating system 628 throughprogram modules 632 andprogram data 634 stored either insystem memory 616 or ondisk storage 624. It is to be appreciated that the present invention can be implemented with various operating systems or combinations of operating systems. - A user enters commands or information into the
computer 612 through input device(s) 636.Input devices 636 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to theprocessing unit 614 through thesystem bus 618 via interface port(s) 638. Interface port(s) 638 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB). Output device(s) 640 use some of the same type of ports as input device(s) 636. Thus, for example, a USB port may be used to provide input tocomputer 612, and to output information fromcomputer 612 to anoutput device 640.Output adapter 642 is provided to illustrate that there are someoutput devices 640 like monitors, speakers, and printers amongother output devices 640 that require special adapters. Theoutput adapters 642 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between theoutput device 640 and thesystem bus 618. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 644. -
Computer 612 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 644. The remote computer(s) 644 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative tocomputer 612. For purposes of brevity, only amemory storage device 646 is illustrated with remote computer(s) 644. Remote computer(s) 644 is logically connected tocomputer 612 through anetwork interface 648 and then physically connected viacommunication connection 650.Network interface 648 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like. WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL). - Communication connection(s) 650 refers to the hardware/software employed to connect the
network interface 648 to thebus 618. Whilecommunication connection 650 is shown for illustrative clarity insidecomputer 612, it can also be external tocomputer 612. The hardware/software necessary for connection to thenetwork interface 648 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards. - What has been described above includes examples of the present invention. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the present invention, but one of ordinary skill in the art may recognize that many further combinations and permutations of the present invention are possible. Accordingly, the present invention is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
Claims (22)
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/729,209 US7505596B2 (en) | 2003-12-05 | 2003-12-05 | Automatic detection of wireless network type |
ES04025545T ES2389651T3 (en) | 2003-12-05 | 2004-10-27 | Automatic detection of wireless network type |
PL04025545T PL1538780T3 (en) | 2003-12-05 | 2004-10-27 | Automatic detection of wireless network type |
EP04025545A EP1538780B1 (en) | 2003-12-05 | 2004-10-27 | Automatic detection of wireless network type |
KR1020040088357A KR101120819B1 (en) | 2003-12-05 | 2004-11-02 | Automatic detection of wireless network type |
CNA2004100858771A CN1625132A (en) | 2003-12-05 | 2004-11-04 | Automatic detection of wireless network type |
JP2004320999A JP5072176B2 (en) | 2003-12-05 | 2004-11-04 | Automatic detection of wireless network type |
US12/403,851 US8477943B2 (en) | 2003-12-05 | 2009-03-13 | Automatic detection of wireless network type |
US13/930,541 US20130298204A1 (en) | 2003-12-05 | 2013-06-28 | Automatic Detection of Wireless Network Type |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/729,209 US7505596B2 (en) | 2003-12-05 | 2003-12-05 | Automatic detection of wireless network type |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/403,851 Continuation US8477943B2 (en) | 2003-12-05 | 2009-03-13 | Automatic detection of wireless network type |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050125693A1 true US20050125693A1 (en) | 2005-06-09 |
US7505596B2 US7505596B2 (en) | 2009-03-17 |
Family
ID=34465787
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/729,209 Expired - Fee Related US7505596B2 (en) | 2003-12-05 | 2003-12-05 | Automatic detection of wireless network type |
US12/403,851 Expired - Fee Related US8477943B2 (en) | 2003-12-05 | 2009-03-13 | Automatic detection of wireless network type |
US13/930,541 Abandoned US20130298204A1 (en) | 2003-12-05 | 2013-06-28 | Automatic Detection of Wireless Network Type |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/403,851 Expired - Fee Related US8477943B2 (en) | 2003-12-05 | 2009-03-13 | Automatic detection of wireless network type |
US13/930,541 Abandoned US20130298204A1 (en) | 2003-12-05 | 2013-06-28 | Automatic Detection of Wireless Network Type |
Country Status (7)
Country | Link |
---|---|
US (3) | US7505596B2 (en) |
EP (1) | EP1538780B1 (en) |
JP (1) | JP5072176B2 (en) |
KR (1) | KR101120819B1 (en) |
CN (1) | CN1625132A (en) |
ES (1) | ES2389651T3 (en) |
PL (1) | PL1538780T3 (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050153684A1 (en) * | 2004-01-13 | 2005-07-14 | Nokia Corporation | Method of connection |
US20050160287A1 (en) * | 2004-01-16 | 2005-07-21 | Dell Products L.P. | Method to deploy wireless network security with a wireless router |
US20060015724A1 (en) * | 2004-07-15 | 2006-01-19 | Amir Naftali | Host credentials authorization protocol |
US20060178131A1 (en) * | 2005-02-07 | 2006-08-10 | Huotari Allen J | Key distribution for wireless devices |
US20060221919A1 (en) * | 2005-04-05 | 2006-10-05 | Mcrae Matthew B | Wireless connection selection and setup |
US20070254614A1 (en) * | 2006-05-01 | 2007-11-01 | Infosys Technologies Ltd. | Secure wireless connections using ssid fields |
US20070255945A1 (en) * | 2006-04-28 | 2007-11-01 | Canon Kabushiki Kaisha | Facilitating the delivery of security credentials to a network device |
US20070286419A1 (en) * | 2006-06-07 | 2007-12-13 | Dmitri Varsanofiev | Efficient Video Delivery in Legacy 802.11 Infrastructure Enviroments |
US20080037786A1 (en) * | 2006-08-09 | 2008-02-14 | Samsung Electronics Co., Ltd | Station and method of collecting information corresponding to security in a wireless network |
US20080120555A1 (en) * | 2006-11-21 | 2008-05-22 | Intermec Ip Corp. | Wireless device grouping via common attribute |
US20080173561A1 (en) * | 2007-01-19 | 2008-07-24 | Jackson W Shaun | Portable electronic devices and carrying cases with built-in network detectors |
US20090093247A1 (en) * | 2007-10-03 | 2009-04-09 | Microsoft Corporation | WWAN device provisioning using signaling channel |
US20090093248A1 (en) * | 2007-10-03 | 2009-04-09 | Microsoft Corporation | WWAN device provisioning using signaling channel |
US20090158148A1 (en) * | 2007-12-17 | 2009-06-18 | Microsoft Corporation | Automatically provisioning a WWAN device |
US20090177801A1 (en) * | 2008-01-07 | 2009-07-09 | Chambers Jr Howell Jack | System and Method for Detecting Free and Open Wireless Networks |
US20100017847A1 (en) * | 2005-03-31 | 2010-01-21 | Brother Kogyo Kabushiki Kaisha | Wireless Connection Setting Program |
US20100067406A1 (en) * | 2008-09-17 | 2010-03-18 | Brother Kogyo Kabushiki Kaisha | Wireless communication device, method to output identifier, and computer usable medium therefor |
US20100082978A1 (en) * | 2008-09-30 | 2010-04-01 | Brother Kogyo Kabushiki Kaisha | Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor |
US20100082999A1 (en) * | 2008-09-30 | 2010-04-01 | Brother Kogyo Kabushiki Kaisha | Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor |
EP2200223A1 (en) * | 2007-09-12 | 2010-06-23 | Panasonic Corporation | Wireless terminal device, wireless connection method, and program |
US20100211658A1 (en) * | 2009-02-16 | 2010-08-19 | Microsoft Corporation | Dynamic firewall configuration |
US20110228330A1 (en) * | 2010-03-18 | 2011-09-22 | Brother Kogyo Kabushiki Kaisha | Wireless Communication System |
EP2375683A1 (en) | 2010-03-30 | 2011-10-12 | Brother Kogyo Kabushiki Kaisha | Wireless communication device |
US9378343B1 (en) * | 2006-06-16 | 2016-06-28 | Nokia Corporation | Automatic detection of required network key type |
US20170111360A1 (en) * | 2015-10-14 | 2017-04-20 | Cisco Technology, Inc. | Accurate detection of rogue wireless access points |
US9730073B1 (en) * | 2015-06-18 | 2017-08-08 | Amazon Technologies, Inc. | Network credential provisioning using audible commands |
US10506430B2 (en) | 2014-02-14 | 2019-12-10 | Kabushiki Kaisha Toshiba | Communication apparatus, communication method, and computer program product |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7505596B2 (en) * | 2003-12-05 | 2009-03-17 | Microsoft Corporation | Automatic detection of wireless network type |
US7310669B2 (en) | 2005-01-19 | 2007-12-18 | Lockdown Networks, Inc. | Network appliance for vulnerability assessment auditing over multiple networks |
US7810138B2 (en) * | 2005-01-26 | 2010-10-05 | Mcafee, Inc. | Enabling dynamic authentication with different protocols on the same port for a switch |
US8520512B2 (en) | 2005-01-26 | 2013-08-27 | Mcafee, Inc. | Network appliance for customizable quarantining of a node on a network |
US20060164199A1 (en) * | 2005-01-26 | 2006-07-27 | Lockdown Networks, Inc. | Network appliance for securely quarantining a node on a network |
US8280046B2 (en) | 2005-09-12 | 2012-10-02 | Interdigital Technology Corporation | Method and system for deriving an encryption key using joint randomness not shared by others |
EP1847060A4 (en) * | 2005-01-27 | 2011-09-14 | Interdigital Tech Corp | Method and system for deriving an encryption key using joint randomness not shared by others |
CN101288260A (en) | 2005-01-27 | 2008-10-15 | 美商内数位科技公司 | Method and system for deriving an encryption key using jointrandomness not shared by others |
KR100666947B1 (en) * | 2005-02-01 | 2007-01-10 | 삼성전자주식회사 | Network Access Method of WLAN Terminal And Network system thereof |
US7647508B2 (en) * | 2005-06-16 | 2010-01-12 | Intel Corporation | Methods and apparatus for providing integrity protection for management and control traffic of wireless communication networks |
US7657255B2 (en) * | 2005-06-23 | 2010-02-02 | Microsoft Corporation | Provisioning of wireless connectivity for devices using NFC |
WO2007068992A1 (en) * | 2005-12-16 | 2007-06-21 | Nokia Corporation | Support for integrated wlan hotspot clients |
CN100518374C (en) * | 2006-02-17 | 2009-07-22 | 鸿富锦精密工业(深圳)有限公司 | Access point and its method for determining preshared key |
KR100819942B1 (en) * | 2006-04-17 | 2008-04-10 | 주식회사 에어큐브 | Method for access control in wire and wireless network |
CN101141444B (en) * | 2006-09-05 | 2010-04-21 | 智邦科技股份有限公司 | Method of connecting new access point of early four-way handshake execution wireless network device |
US8024806B2 (en) * | 2006-10-17 | 2011-09-20 | Intel Corporation | Method, apparatus and system for enabling a secure location-aware platform |
US8199699B2 (en) * | 2007-10-26 | 2012-06-12 | Ricoh Company, Ltd. | Legacy support for Wi-Fi protected setup |
US9008314B2 (en) * | 2008-11-18 | 2015-04-14 | Verizon Patent And Licensing Inc. | Secure wireless communications |
JP5193850B2 (en) * | 2008-12-26 | 2013-05-08 | 株式会社東芝 | Wireless communication method |
JP2011139238A (en) * | 2009-12-28 | 2011-07-14 | Seiko Epson Corp | Wireless communication apparatus, wireless communication method, and wireless communication program |
CN102215483A (en) * | 2010-04-08 | 2011-10-12 | 华为终端有限公司 | Method and device for performing negotiation according to Wi-Fi protected setup (WPS) protocol |
JP5418394B2 (en) | 2010-04-28 | 2014-02-19 | ブラザー工業株式会社 | Wireless communication device |
JP5709497B2 (en) * | 2010-12-07 | 2015-04-30 | キヤノン株式会社 | COMMUNICATION DEVICE, COMMUNICATION DEVICE CONTROL METHOD, AND PROGRAM |
KR101915314B1 (en) * | 2011-10-25 | 2018-11-07 | 삼성전자주식회사 | Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal |
US20130166910A1 (en) * | 2011-12-22 | 2013-06-27 | Broadcom Corporation | Revocable Security System and Method for Wireless Access Points |
CN103188676B (en) * | 2011-12-29 | 2017-12-26 | 中兴通讯股份有限公司 | Extensible Authentication Protocol authentication accessing method and device |
US8693403B1 (en) | 2012-07-13 | 2014-04-08 | Joingo, Llc | Method and system for detection and correction of a WiFi login failure |
US9204472B1 (en) | 2012-07-13 | 2015-12-01 | Joingo, Llc | Method and system for detection and correction of a WiFi login failure |
US20150026779A1 (en) * | 2013-07-16 | 2015-01-22 | Qualcomm Connected Experiences, Inc. | Performing remote wi-fi network configuration when a network security protocol is unknown |
US10492069B2 (en) | 2014-09-30 | 2019-11-26 | Hewlett Packard Enterprise Development Lp | Advertising multiple service set identifiers |
CN108377500B (en) * | 2016-11-09 | 2021-05-14 | 阿里巴巴集团控股有限公司 | Wifi network connection method, device and equipment |
CN110677851B (en) * | 2019-08-29 | 2022-12-27 | 努比亚技术有限公司 | Terminal network access method and network access equipment access method |
KR102143569B1 (en) * | 2020-04-14 | 2020-08-12 | 주식회사 케이디 | Remote water metering system corresponding to heterogeneous network environment |
US11764969B2 (en) * | 2020-12-01 | 2023-09-19 | Schweitzer Engineering Laboratories, Inc. | Media access control security (MACsec) sandboxing for suspect devices |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088451A (en) * | 1996-06-28 | 2000-07-11 | Mci Communications Corporation | Security system and method for network element access |
US20010023446A1 (en) * | 2000-02-24 | 2001-09-20 | Peter Balogh | Method and equipment for accessing a telecommunication network |
US20020176366A1 (en) * | 2001-03-13 | 2002-11-28 | Microsoft Corporation | System and method for achieving zero-configuration wireless computing and computing device incorporating same |
US20030054818A1 (en) * | 2001-09-17 | 2003-03-20 | Microsoft Corporation | System and method for concurrent operation of a wireless device in two disjoint wireless networks |
US20030097596A1 (en) * | 2001-11-19 | 2003-05-22 | Muratov Alexander Victorovitch | Method and system for protecting data within portable electronic devices |
US6629151B1 (en) * | 1999-03-18 | 2003-09-30 | Microsoft Corporation | Method and system for querying the dynamic aspects of wireless connection |
US20030204748A1 (en) * | 2002-04-30 | 2003-10-30 | Tom Chiu | Auto-detection of wireless network accessibility |
US6674738B1 (en) * | 2001-09-17 | 2004-01-06 | Networks Associates Technology, Inc. | Decoding and detailed analysis of captured frames in an IEEE 802.11 wireless LAN |
US20040068653A1 (en) * | 2002-10-08 | 2004-04-08 | Fascenda Anthony C. | Shared network access using different access keys |
US20040111520A1 (en) * | 2002-12-06 | 2004-06-10 | Krantz Anton W. | Increasing the level of automation when provisioning a computer system to access a network |
US20050063338A1 (en) * | 2003-09-24 | 2005-03-24 | Intel Corporation | Seamless roaming apparatus, systems, and methods |
US7099627B2 (en) * | 2003-06-11 | 2006-08-29 | Acco Brands Usa Llc | Systems and methods for a wireless network connection point locator |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6526034B1 (en) * | 1999-09-21 | 2003-02-25 | Tantivy Communications, Inc. | Dual mode subscriber unit for short range, high rate and long range, lower rate data communications |
EP1742422B1 (en) * | 2001-12-26 | 2014-01-22 | Kabushiki Kaisha Toshiba | Wireless communication apparatus |
US20030163558A1 (en) | 2002-02-25 | 2003-08-28 | Docomo Communications Laboratories Usa, Inc. | System and method for Hyper Operator controlled network probing across overlaid heterogeneous access networks |
US7448068B2 (en) * | 2002-10-21 | 2008-11-04 | Microsoft Corporation | Automatic client authentication for a wireless network protected by PEAP, EAP-TLS, or other extensible authentication protocols |
US7350077B2 (en) * | 2002-11-26 | 2008-03-25 | Cisco Technology, Inc. | 802.11 using a compressed reassociation exchange to facilitate fast handoff |
US7505596B2 (en) | 2003-12-05 | 2009-03-17 | Microsoft Corporation | Automatic detection of wireless network type |
-
2003
- 2003-12-05 US US10/729,209 patent/US7505596B2/en not_active Expired - Fee Related
-
2004
- 2004-10-27 PL PL04025545T patent/PL1538780T3/en unknown
- 2004-10-27 ES ES04025545T patent/ES2389651T3/en active Active
- 2004-10-27 EP EP04025545A patent/EP1538780B1/en not_active Not-in-force
- 2004-11-02 KR KR1020040088357A patent/KR101120819B1/en active IP Right Grant
- 2004-11-04 JP JP2004320999A patent/JP5072176B2/en not_active Expired - Fee Related
- 2004-11-04 CN CNA2004100858771A patent/CN1625132A/en active Pending
-
2009
- 2009-03-13 US US12/403,851 patent/US8477943B2/en not_active Expired - Fee Related
-
2013
- 2013-06-28 US US13/930,541 patent/US20130298204A1/en not_active Abandoned
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088451A (en) * | 1996-06-28 | 2000-07-11 | Mci Communications Corporation | Security system and method for network element access |
US6629151B1 (en) * | 1999-03-18 | 2003-09-30 | Microsoft Corporation | Method and system for querying the dynamic aspects of wireless connection |
US20010023446A1 (en) * | 2000-02-24 | 2001-09-20 | Peter Balogh | Method and equipment for accessing a telecommunication network |
US20020176366A1 (en) * | 2001-03-13 | 2002-11-28 | Microsoft Corporation | System and method for achieving zero-configuration wireless computing and computing device incorporating same |
US20030054818A1 (en) * | 2001-09-17 | 2003-03-20 | Microsoft Corporation | System and method for concurrent operation of a wireless device in two disjoint wireless networks |
US6674738B1 (en) * | 2001-09-17 | 2004-01-06 | Networks Associates Technology, Inc. | Decoding and detailed analysis of captured frames in an IEEE 802.11 wireless LAN |
US20030097596A1 (en) * | 2001-11-19 | 2003-05-22 | Muratov Alexander Victorovitch | Method and system for protecting data within portable electronic devices |
US20030204748A1 (en) * | 2002-04-30 | 2003-10-30 | Tom Chiu | Auto-detection of wireless network accessibility |
US20040068653A1 (en) * | 2002-10-08 | 2004-04-08 | Fascenda Anthony C. | Shared network access using different access keys |
US20040111520A1 (en) * | 2002-12-06 | 2004-06-10 | Krantz Anton W. | Increasing the level of automation when provisioning a computer system to access a network |
US7099627B2 (en) * | 2003-06-11 | 2006-08-29 | Acco Brands Usa Llc | Systems and methods for a wireless network connection point locator |
US20050063338A1 (en) * | 2003-09-24 | 2005-03-24 | Intel Corporation | Seamless roaming apparatus, systems, and methods |
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050153684A1 (en) * | 2004-01-13 | 2005-07-14 | Nokia Corporation | Method of connection |
US9655030B2 (en) * | 2004-01-13 | 2017-05-16 | Nokia Technologies Oy | Method of connection with a communications network when access point supports inter-working |
US20050160287A1 (en) * | 2004-01-16 | 2005-07-21 | Dell Products L.P. | Method to deploy wireless network security with a wireless router |
US20060015724A1 (en) * | 2004-07-15 | 2006-01-19 | Amir Naftali | Host credentials authorization protocol |
US7512970B2 (en) * | 2004-07-15 | 2009-03-31 | Cisco Technology, Inc. | Host credentials authorization protocol |
US20060178131A1 (en) * | 2005-02-07 | 2006-08-10 | Huotari Allen J | Key distribution for wireless devices |
US8260257B2 (en) * | 2005-02-07 | 2012-09-04 | Cisco Technology, Inc. | Key distribution for wireless devices |
US20100017847A1 (en) * | 2005-03-31 | 2010-01-21 | Brother Kogyo Kabushiki Kaisha | Wireless Connection Setting Program |
US9015288B2 (en) * | 2005-03-31 | 2015-04-21 | Brother Kogyo Kabushiki Kaisha | Wireless connection setting program |
US8687543B2 (en) * | 2005-04-05 | 2014-04-01 | Cisco Technology, Inc. | Wireless connection selection and setup |
US9191883B2 (en) | 2005-04-05 | 2015-11-17 | Cisco Technology, Inc. | Wireless connection selection and setup |
US20060221919A1 (en) * | 2005-04-05 | 2006-10-05 | Mcrae Matthew B | Wireless connection selection and setup |
US7926092B2 (en) | 2006-04-28 | 2011-04-12 | Canon Kabushiki Kaisha | Facilitating the delivery of security credentials to a network device |
US20070255945A1 (en) * | 2006-04-28 | 2007-11-01 | Canon Kabushiki Kaisha | Facilitating the delivery of security credentials to a network device |
US20070254614A1 (en) * | 2006-05-01 | 2007-11-01 | Infosys Technologies Ltd. | Secure wireless connections using ssid fields |
US20070286419A1 (en) * | 2006-06-07 | 2007-12-13 | Dmitri Varsanofiev | Efficient Video Delivery in Legacy 802.11 Infrastructure Enviroments |
US9378343B1 (en) * | 2006-06-16 | 2016-06-28 | Nokia Corporation | Automatic detection of required network key type |
US9408077B1 (en) * | 2006-06-16 | 2016-08-02 | Nokia Corporation | Communication action bar in a multimodal communication device |
US20080037786A1 (en) * | 2006-08-09 | 2008-02-14 | Samsung Electronics Co., Ltd | Station and method of collecting information corresponding to security in a wireless network |
US8031874B2 (en) * | 2006-08-09 | 2011-10-04 | Samsung Electronics Co., Ltd. | Station and method of collecting information corresponding to security in a wireless network |
US20080120555A1 (en) * | 2006-11-21 | 2008-05-22 | Intermec Ip Corp. | Wireless device grouping via common attribute |
US20080173561A1 (en) * | 2007-01-19 | 2008-07-24 | Jackson W Shaun | Portable electronic devices and carrying cases with built-in network detectors |
EP2200223A1 (en) * | 2007-09-12 | 2010-06-23 | Panasonic Corporation | Wireless terminal device, wireless connection method, and program |
EP2200223A4 (en) * | 2007-09-12 | 2012-03-07 | Panasonic Corp | Wireless terminal device, wireless connection method, and program |
US20090093247A1 (en) * | 2007-10-03 | 2009-04-09 | Microsoft Corporation | WWAN device provisioning using signaling channel |
US20090093248A1 (en) * | 2007-10-03 | 2009-04-09 | Microsoft Corporation | WWAN device provisioning using signaling channel |
US20090158148A1 (en) * | 2007-12-17 | 2009-06-18 | Microsoft Corporation | Automatically provisioning a WWAN device |
WO2009079171A1 (en) * | 2007-12-17 | 2009-06-25 | Microsoft Corporation | Automatically provisioning a wwan device |
US8949434B2 (en) | 2007-12-17 | 2015-02-03 | Microsoft Corporation | Automatically provisioning a WWAN device |
US20090177801A1 (en) * | 2008-01-07 | 2009-07-09 | Chambers Jr Howell Jack | System and Method for Detecting Free and Open Wireless Networks |
US7730219B2 (en) * | 2008-01-07 | 2010-06-01 | Lenovo (Singapore) Pte. Ltd. | System and method for detecting free and open wireless networks |
US20100067406A1 (en) * | 2008-09-17 | 2010-03-18 | Brother Kogyo Kabushiki Kaisha | Wireless communication device, method to output identifier, and computer usable medium therefor |
US8520853B2 (en) | 2008-09-30 | 2013-08-27 | Brother Kogyo Kabushiki Kaisha | Wireless communication device, method for wireless connection, and computer usable medium therefor |
US8351607B2 (en) | 2008-09-30 | 2013-01-08 | Brother Kogyo Kabushiki Kaisha | Wireless communication device, method for wireless connection, and computer usable medium therefor |
US20100082978A1 (en) * | 2008-09-30 | 2010-04-01 | Brother Kogyo Kabushiki Kaisha | Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor |
US20100082999A1 (en) * | 2008-09-30 | 2010-04-01 | Brother Kogyo Kabushiki Kaisha | Wireless Communication Device, Method for Wireless Connection, and Computer Usable Medium Therefor |
US20100211658A1 (en) * | 2009-02-16 | 2010-08-19 | Microsoft Corporation | Dynamic firewall configuration |
US8024482B2 (en) | 2009-02-16 | 2011-09-20 | Microsoft Corporation | Dynamic firewall configuration |
US8607048B2 (en) | 2010-03-18 | 2013-12-10 | Brother Kogyo Kabushiki Kaisha | Wireless communication system |
US20110228330A1 (en) * | 2010-03-18 | 2011-09-22 | Brother Kogyo Kabushiki Kaisha | Wireless Communication System |
US8774026B2 (en) | 2010-03-30 | 2014-07-08 | Brother Kogyo Kabushiki Kaisha | Wireless communication device |
EP2375683A1 (en) | 2010-03-30 | 2011-10-12 | Brother Kogyo Kabushiki Kaisha | Wireless communication device |
US10506430B2 (en) | 2014-02-14 | 2019-12-10 | Kabushiki Kaisha Toshiba | Communication apparatus, communication method, and computer program product |
US9730073B1 (en) * | 2015-06-18 | 2017-08-08 | Amazon Technologies, Inc. | Network credential provisioning using audible commands |
US20170111360A1 (en) * | 2015-10-14 | 2017-04-20 | Cisco Technology, Inc. | Accurate detection of rogue wireless access points |
US10334445B2 (en) * | 2015-10-14 | 2019-06-25 | Cisco Technology, Inc. | Accurate detection of rogue wireless access points |
Also Published As
Publication number | Publication date |
---|---|
US8477943B2 (en) | 2013-07-02 |
JP5072176B2 (en) | 2012-11-14 |
US7505596B2 (en) | 2009-03-17 |
PL1538780T3 (en) | 2012-11-30 |
JP2005176320A (en) | 2005-06-30 |
US20130298204A1 (en) | 2013-11-07 |
ES2389651T3 (en) | 2012-10-30 |
EP1538780A3 (en) | 2010-10-20 |
KR20050054817A (en) | 2005-06-10 |
EP1538780B1 (en) | 2012-07-04 |
KR101120819B1 (en) | 2012-03-23 |
EP1538780A2 (en) | 2005-06-08 |
CN1625132A (en) | 2005-06-08 |
US20100329461A1 (en) | 2010-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7505596B2 (en) | Automatic detection of wireless network type | |
US7809354B2 (en) | Detecting address spoofing in wireless network environments | |
TWI388180B (en) | Key generation in a communication system | |
JP4575679B2 (en) | Wireless network handoff encryption key | |
KR101629118B1 (en) | A method and a device of authentication in the converged wireless network | |
KR100739809B1 (en) | Method and apparatus for managing stations which are associated with wpa-psk wireless network | |
US20060149858A1 (en) | Establishing wireless universal serial bus (WUSB) connection via a trusted medium | |
US11863985B2 (en) | Method and apparatus for detecting and handling evil twin access points | |
US20060107050A1 (en) | Method used by an access point of a wireless lan and related apparatus | |
US10798082B2 (en) | Network authentication triggering method and related device | |
US20230344626A1 (en) | Network connection management method and apparatus, readable medium, program product, and electronic device | |
US9807088B2 (en) | Method and network node for obtaining a permanent identity of an authenticating wireless device | |
TW201733377A (en) | WWAN-WLAN aggregation security | |
US20160134610A1 (en) | Privacy during re-authentication of a wireless station with an authentication server | |
CN101785343A (en) | Fast transitioning resource negotiation | |
WO2013152740A1 (en) | Authentication method, device and system for user equipment | |
JP2019033458A (en) | Communication device, communication terminal, communication system, communication control method and communication control program | |
KR20060079107A (en) | Extensible architecture for untrusted medium device configuration via trusted medium | |
TW201301928A (en) | Method, program product, and system of network connection in a wireless local area network | |
CN108990052B (en) | Method for detecting WPA2 protocol vulnerability | |
US20230114761A1 (en) | Method and system for securely handling re-connection of client devices to a wireless network | |
Martin et al. | WEP VS WPA2 Encryptions | |
KR20060030696A (en) | Method and apparatus for controlling wireless network access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DUPLESSIS, JEAN-PIERRE;LYNDERSAY, SEAN;KRANTZ, ANTON;AND OTHERS;REEL/FRAME:015432/0238;SIGNING DATES FROM 20040316 TO 20040602 |
|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DUPLESSIS, JEAN-PIERRE;LYNDERSAY, SEAN;KRANTZ, ANTON;AND OTHERS;REEL/FRAME:015241/0599;SIGNING DATES FROM 20040316 TO 20040602 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034541/0477 Effective date: 20141014 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20210317 |